CrypticCoffee

joined 2 years ago
MODERATOR OF
[–] [email protected] -1 points 1 year ago (6 children)

Try a better instance. Lemm.ee and Lemmy.ml are both run by competent techies and less knee jerk intolerance to anything other than the prevailing opinion there.

[–] [email protected] 10 points 1 year ago (1 children)

Examples?

I occasionally see this argument but not yet seen any evidence to back it up.

[–] [email protected] 7 points 1 year ago (7 children)

Lemm.ee is pretty sweet and well run. Ml and ee are superior to world IMHO.

[–] [email protected] 4 points 1 year ago (4 children)

Ah, appreciate the clarification.

If your payment is linked to the number, is it any more private than a PAYG number?

[–] [email protected] 1 points 1 year ago (1 children)

Gosh, you're insufferable. I'm out. Carry on your hate boner, Elon fan boi (because you spend most of your time reading about and writing about Elon). For someone who doesn't like Elon, your life seems to be about him. I pity that. Good luck in your crusade.

[–] [email protected] 14 points 1 year ago* (last edited 1 year ago) (10 children)

Maybe I'm being dumb here, but what is this and why would I use it over Signal or Matrix?

What about it justifies payment?

[–] [email protected] 2 points 1 year ago

Ah, apreciate the clarification.

[–] [email protected] 1 points 1 year ago (3 children)

Actually, what you responded to was about elections. I responded to your second paragraph because you dismissed a valid point to make a somewhat unhinged and fanciful assertion. Ironically, you're the one ignoring points you disagree with.

I replied yesterday because that is when I saw the community and post from another one.

Arguing with narcissists that believe they're always right is no fun. I can relate to Don Lemon rn.

[–] [email protected] 4 points 1 year ago

Yeah, it stood out to me.

It's always in what they don't say.

If they say it's not a RCE vulnerability, it could still be a privilege escalation vulnerability etc. They avoided saying their software isn't being exploited or "we have seen no evidence our software has been compromised", or "there is no clear signs...".

Which gives a little wriggle room.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (5 children)

Not at all. If Elon takes drugs. It doesn't naturally follow that every decision he makes is drug fuelled. That's a logical fallacy.

What has SV drug culture in general got to do with this? How does usage at FB for example impact on Musk's decisions?

I'm not deliberately ignoring the drug point. I just think it's a weak and shallow point, that explains very little. Having to respond in depth to every weak argument is a waste of time. A straw man argument is misrepresting a point. Ignoring a point cannot misrepresent it. It sounds like you don't fully understand what a straw man argument is.

[–] [email protected] 2 points 1 year ago

Are they the worst ones that cannot design their own code?

[–] [email protected] 8 points 1 year ago (3 children)

So if it isn't a RCE vulnerability, what vulnerability is it?

view more: ‹ prev next ›